Sciweavers

722 search results - page 29 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
CSFW
2010
IEEE
14 years 12 days ago
Information Flow Monitor Inlining
In recent years it has been shown that dynamic monitoring can be used to soundly enforce information flow policies. For programs distributed in source or bytecode form, the use o...
Andrey Chudnov, David A. Naumann
EUROISI
2008
13 years 10 months ago
An Information Theory Approach to Identify Sets of Key Players
This paper presents an application of information theory to identify sets of key players in social networks. First, we define two entropy measures that we use to analyze the struct...
Daniel Ortiz Arroyo, Dil Muhammad Akbar Hussain
CSFW
1999
IEEE
14 years 25 days ago
What Is Intransitive Noninterference?
The term "intransitive noninterference" refers to the information flow properties required of systems like downgraders, in which it may be legitimate for information to ...
A. W. Roscoe, M. H. Goldsmith
HICSS
2010
IEEE
156views Biometrics» more  HICSS 2010»
14 years 1 months ago
Tacit Knowledge Flows and Institutional Theory: Accelerating Acculturation
Knowledge is key to sustainable competitive advantage, but different kinds of knowledge affect competitive advantage differently. This applies especially to the environment of inc...
Alicemary Aspell Adams, June G. Chin Yi Lee, Mark ...
POPL
2006
ACM
14 years 8 months ago
On flow-sensitive security types
This article investigates formal properties of a family of semantically sound flow-sensitive type systems for tracking information flow in simple While programs. The family is ind...
Sebastian Hunt, David Sands